<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL vulnerabilities in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760534#M24177</link>
    <description>&lt;P&gt;Hi Splunk,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Could you please help me to resolve the below mentioned vulnerability.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;H3&gt;&lt;SPAN&gt;&lt;STRONG&gt;Synopsis&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H3&gt;&lt;P&gt;&lt;SPAN&gt;The remote service encrypts traffic using a protocol with known weaknesses.&lt;/SPAN&gt;&lt;/P&gt;&lt;H3&gt;&lt;SPAN&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H3&gt;&lt;P&gt;&lt;SPAN&gt;The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;- An insecure padding scheme with CBC ciphers.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;- Insecure session renegotiation and resumption schemes.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Please provide me the steps to remediate this.&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Apr 2026 07:07:38 GMT</pubDate>
    <dc:creator>Pooja1</dc:creator>
    <dc:date>2026-04-29T07:07:38Z</dc:date>
    <item>
      <title>SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760534#M24177</link>
      <description>&lt;P&gt;Hi Splunk,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Could you please help me to resolve the below mentioned vulnerability.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;H3&gt;&lt;SPAN&gt;&lt;STRONG&gt;Synopsis&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H3&gt;&lt;P&gt;&lt;SPAN&gt;The remote service encrypts traffic using a protocol with known weaknesses.&lt;/SPAN&gt;&lt;/P&gt;&lt;H3&gt;&lt;SPAN&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H3&gt;&lt;P&gt;&lt;SPAN&gt;The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;- An insecure padding scheme with CBC ciphers.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;- Insecure session renegotiation and resumption schemes.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Please provide me the steps to remediate this.&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 07:07:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760534#M24177</guid>
      <dc:creator>Pooja1</dc:creator>
      <dc:date>2026-04-29T07:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760538#M24178</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/258423"&gt;@Pooja1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have a reference or CVE for the vulnerabilities you are referring to?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you been able to establish that the vulnerability does actually affect/impact your environment, rather than just being picked up by an external vulnerability scanner?&lt;/P&gt;&lt;P&gt;What version of Splunk are you running?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 09:14:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760538#M24178</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2026-04-29T09:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760541#M24179</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;No CVE number found for this vulnerability.&lt;BR /&gt;&lt;BR /&gt;I'm not sure whether this vulnerability affect/impact our environment. However, these kind of vulnerbilities are triggered with the tenable scan.&lt;BR /&gt;&lt;BR /&gt;Current Splunk version running on our servers is 9.1.X.&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 09:40:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760541#M24179</guid>
      <dc:creator>Pooja1</dc:creator>
      <dc:date>2026-04-29T09:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760544#M24180</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/258423"&gt;@Pooja1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;9.1.x went out of support nearly 12 months ago, therefore I think the best solution here is to update to the latest version of a supported 9.x or even 10.x release as these will have more up-to-date security patches.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 13:11:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760544#M24180</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2026-04-29T13:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760545#M24181</link>
      <description>&lt;P&gt;Splunk has not supported SSL 2.0 or 3.0 for some time now.&amp;nbsp; It only supports TLS 1.0, 1.1, and 1.2 with 1.2 being the recommended version.&amp;nbsp; I'm curious about how Tenable was able to connect using an unsupported protocol.&lt;/P&gt;&lt;P&gt;Splunk 9.1.x is no longer supported so no fixes are forthcoming for that version.&amp;nbsp; A supported version may contain a fix, but it's hard to know without a CVE number.&lt;/P&gt;&lt;P&gt;You may find mention of a fix at &lt;A href="http://advisory.splunk.com" target="_blank"&gt;http://advisory.splunk.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 13:14:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760545#M24181</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2026-04-29T13:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760546#M24182</link>
      <description>&lt;P&gt;Okay, got it.&lt;BR /&gt;&lt;BR /&gt;Thank you for the help&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 13:23:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760546#M24182</guid>
      <dc:creator>Pooja1</dc:creator>
      <dc:date>2026-04-29T13:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760547#M24183</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thank you for explaining about this.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 13:24:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760547#M24183</guid>
      <dc:creator>Pooja1</dc:creator>
      <dc:date>2026-04-29T13:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760581#M24190</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/258423"&gt;@Pooja1&lt;/a&gt;&amp;nbsp;may i ask few more details pls&lt;/P&gt;&lt;P&gt;1) are you using the "Tenable Add-On for Splunk", if yes, the version number pls&lt;/P&gt;&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/4060" target="_blank"&gt;https://splunkbase.splunk.com/app/4060&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2) are you using the Splunk Enterprise Security, if yes, the version number pls&lt;BR /&gt;3) may we know if there are any plans for Splunk upgrade in near future?&lt;BR /&gt;4) the above mentioned vulnerability, may we know where do you see this exactly?&lt;BR /&gt;between 2 regular app hosts or on the Splunk system itself..&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------------&lt;BR /&gt;If this post or any post addressed your question, could you pls:&lt;BR /&gt;Give it karma to show appreciation&lt;/P&gt;&lt;P&gt;PS - As of Apr 2026, my Karma Given is 2290 and my Karma Received is 494, lets revamp the Karma Culture!&lt;BR /&gt;Thanks and best regards, Sekar&lt;BR /&gt;----------------------------------------------------------------------------------------------&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 11:45:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760581#M24190</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2026-04-30T11:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760599#M24201</link>
      <description>&lt;P&gt;Apart from what's been already said about upgrading, it's worth noting that at least some of those issues can be mitigated with proper configuration. See&amp;nbsp;&lt;A href="https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/9.0/secure-splunk-platform-communications-with-transport-layer-security-certificates/configure-ssl-and-tls-protocol-version-support-for-secure-connections-between-splunk-platform-instances" target="_blank"&gt;https://help.splunk.com/en/splunk-enterprise/administer/manage-users-and-security/9.0/secure-splunk-platform-communications-with-transport-layer-security-certificates/configure-ssl-and-tls-protocol-version-support-for-secure-connections-between-splunk-platform-instances&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 19:32:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760599#M24201</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2026-04-30T19:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760881#M24245</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/80737"&gt;@inventsekar&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;1) are you using the "Tenable Add-On for Splunk", if yes, the version number pls&lt;BR /&gt;- Yes, 7.0.0&lt;/P&gt;&lt;P&gt;2) are you using the Splunk Enterprise Security, if yes, the version number pls&lt;BR /&gt;-Yes, 8.3.0 but its a different stack&lt;BR /&gt;&lt;BR /&gt;3) may we know if there are any plans for Splunk upgrade in near future?&lt;BR /&gt;- We have upgraded to 9.4.10&lt;BR /&gt;&lt;BR /&gt;4) the above mentioned vulnerability, may we know where do you see this exactly?&lt;BR /&gt;between 2 regular app hosts or on the Splunk system itself..&lt;BR /&gt;- Yes, its in Splunk server itself.&lt;BR /&gt;&lt;BR /&gt;FYI - we have 3 differenent stack on Splunk Cloud for Splunk core, ES and ITSI.&lt;BR /&gt;&lt;BR /&gt;HF's, DS, IHFs are on on-prem&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2026 07:37:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760881#M24245</guid>
      <dc:creator>Pooja1</dc:creator>
      <dc:date>2026-05-12T07:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL vulnerabilities</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760882#M24246</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;Thank for the details. Let me go through it.&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2026 07:38:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SSL-vulnerabilities/m-p/760882#M24246</guid>
      <dc:creator>Pooja1</dc:creator>
      <dc:date>2026-05-12T07:38:46Z</dc:date>
    </item>
  </channel>
</rss>

